Follow
Marcel Winandy
Marcel Winandy
Senior Expert Cyber Security Architect at E.ON
Verified email at eon.com - Homepage
Title
Cited by
Cited by
Year
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8442010
Privilege escalation attacks on android
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
6882011
ROPdefender: A detection tool to defend against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
4232011
Securing the e-health cloud
H Löhr, AR Sadeghi, M Winandy
Proceedings of the 1st acm international health informatics symposium, 220-229, 2010
3812010
Token-based cloud computing: secure outsourcing of data and arbitrary computations with lower latency
AR Sadeghi, T Schneider, M Winandy
Trust and Trustworthy Computing: Third International Conference, TRUST 2010 …, 2010
2612010
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks
L Davi, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 49-54, 2009
2432009
Property-based TPM virtualization
AR Sadeghi, C Stüble, M Winandy
International Conference on Information Security, 1-16, 2008
1302008
TCG inside? A note on TPM specification compliance
AR Sadeghi, M Selhorst, C Stüble, C Wachsmann, M Winandy
Proceedings of the first ACM workshop on Scalable trusted computing, 47-56, 2006
1102006
Compartmented security for browsers-or how to thwart a phisher with trusted computing
S Gajek, AR Sadeghi, C Stuble, M Winandy
The Second International Conference on Availability, Reliability and …, 2007
792007
Return-oriented programming without returns on ARM
L Davi, A Dmitrienko, AR Sadeghi, M Winandy
Technical Report HGI-TR-2010-002, Ruhr-University Bochum, 2010
732010
Trusted Virtual Domains–design, implementation and lessons learned
L Catuogno, A Dmitrienko, K Eriksson, D Kuhlmann, G Ramunno, ...
Trusted Systems: First International Conference, INTRUST 2009, Beijing …, 2010
562010
Patterns for secure boot and secure storage in computer systems
H Löhr, AR Sadeghi, M Winandy
2010 International Conference on Availability, Reliability and Security, 569-573, 2010
552010
TruWallet: trustworthy and migratable wallet-based web authentication
S Gajek, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2009 ACM workshop on Scalable trusted computing, 19-28, 2009
542009
Uni-directional trusted path: Transaction confirmation on just one device
A Filyanov, JM McCuney, AR Sadeghiz, M Winandy
2011 IEEE/IFIP 41st International Conference on Dependable Systems …, 2011
492011
Flexible patient-controlled security for electronic health records
T Hupperich, H Löhr, AR Sadeghi, M Winandy
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
482012
Flexible and secure enterprise rights management based on trusted virtual domains
Y Gasmi, AR Sadeghi, P Stewin, M Unger, M Winandy, R Husseiki, ...
Proceedings of the 3rd ACM workshop on Scalable trusted computing, 71-80, 2008
412008
Evaluating analysis tools for android apps: Status quo and robustness against obfuscation
J Hoffmann, T Rytilahti, D Maiorca, M Winandy, G Giacinto, T Holz
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
332016
TruWalletM: Secure web authentication on mobile platforms
S Bugiel, A Dmitrienko, K Kostiainen, AR Sadeghi, M Winandy
Trusted Systems: Second International Conference, INTRUST 2010, Beijing …, 2011
302011
A trusted versioning file system for passive mobile storage devices
L Catuogno, H Löhr, M Winandy, AR Sadeghi
Journal of Network and Computer Applications 38, 65-75, 2014
262014
Transparent Mobile Storage Protection in Trusted Virtual Domains.
L Catuogno, H Löhr, M Manulis, AR Sadeghi, M Winandy
LISA, 159-172, 2009
242009
The system can't perform the operation now. Try again later.
Articles 1–20